Search results for: family security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1409

Search results for: family security

569 A Novel Hybrid Mobile Agent Based Distributed Intrusion Detection System

Authors: Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar

Abstract:

The first generation of Mobile Agents based Intrusion Detection System just had two components namely data collection and single centralized analyzer. The disadvantage of this type of intrusion detection is if connection to the analyzer fails, the entire system will become useless. In this work, we propose novel hybrid model for Mobile Agent based Distributed Intrusion Detection System to overcome the current problem. The proposed model has new features such as robustness, capability of detecting intrusion against the IDS itself and capability of updating itself to detect new pattern of intrusions. In addition, our proposed model is also capable of tackling some of the weaknesses of centralized Intrusion Detection System models.

Keywords: Distributed Intrusion Detection System, Mobile Agents, Network Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756
568 A New Proxy Signature Scheme As Secure As ElGamal Signature

Authors: Song Han, Elizabeth Chang, Jie Wang, Wanquan Liu

Abstract:

Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.

Keywords: ElGamal signature, Proxy signature, Security, Hash function, Fair privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1572
567 Parallel Branch and Bound Model Using Logarithmic Sampling (PBLS) for Symmetric Traveling Salesman Problem

Authors: Sheikh Muhammad Azam, Masood-ur-Rehman, Adnan Khalid Bhatti, Nadeem Daudpota

Abstract:

Very Large and/or computationally complex optimization problems sometimes require parallel or highperformance computing for achieving a reasonable time for computation. One of the most popular and most complicate problems of this family is “Traveling Salesman Problem". In this paper we have introduced a Branch & Bound based algorithm for the solution of such complicated problems. The main focus of the algorithm is to solve the “symmetric traveling salesman problem". We reviewed some of already available algorithms and felt that there is need of new algorithm which should give optimal solution or near to the optimal solution. On the basis of the use of logarithmic sampling, it was found that the proposed algorithm produced a relatively optimal solution for the problem and results excellent performance as compared with the traditional algorithms of this series.

Keywords: Parallel execution, symmetric traveling salesman problem, branch and bound algorithm, logarithmic sampling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2312
566 Architecture for Smart Cities’ Sustainable Modular Houses

Authors: Khaled Elbehiery, Hussam Elbehiery

Abstract:

Smart cities are a framework of technologies along with sustainable infrastructure to provide their citizens an improved quality of life, safer environment, affordability, and more, which in turn helps with the society's economic growth. The proposed research will focus on the primary building block of the smart city; the infrastructure of the house itself. The traditional method of building houses has been, for a long time, nothing but a costly manufacturing process, and consequently, buying a house becomes not an option for everyone anymore. The smart cities' Modular Houses are not using traditional building construction materials; the design reduces the common lengthy construction times and associated high costs. The Modular Houses are technological homes, low-cost and customizable based on a family's requirements. In addition, the Modular Houses are environmentally friendly and healthy enough to assist with the pandemic situation.

Keywords: Smart cities, modular houses, single-unit property, multi-unit property, mobility features, chain-supply, livable environment, carbon footprint.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 273
565 An Overview of the Risk for HIV/AIDS among Young Women in South Africa: Gender Based Violence

Authors: Shaneil Taylor

Abstract:

Gender-based violence is a reflection of the inequalities that are associated within a society between the men and women that affects the health, dignity, security and autonomy of its victims. There are various determinants that contribute to the health risk of young women who have experienced sexual violence, in countries that have a high prevalence rate for HIV. For instance, in South Africa, where the highest prevalence rate for HIV is among young women, their susceptibility to the virus has been increased by sexual violence and cultural inequalities. Therefore, this study is a review of literature that explores how gender-based violence increases the possibility for HIV/AIDS among young women in South Africa.

Keywords: Gender based violence, HIV/AIDS transmission, young women, Risky sexual behavior.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1760
564 Identification of Aquatic and Semi aquatic Birds of Sattarkhan Lake (East Azerbaijan- Iran)

Authors: Mahbobeh Hajirostamloo

Abstract:

Aquatic and semi aquatic birds as a group are suited to feed and breed in environments in which water forms a fundamental part. These birds are biological indicator in aquatic environment, because these birds belong to the top level of food chain in aquatic ecosystems. There are 61 species in 14 families of aquatic and semi aquatic birds in Iran. The birds of the Sattarkhan Lake belong to 16 species in 8 families which include 26.2 percent of total Aquatic and semi aquatic bird species and 57% of Aquatic and semi aquatic bird's family of Iran. Study was carried out monthly at Sattarkhan Lake show the existence of Phalacrocorax carbo, Ardea cinerea, Egretta alba, Egretta garzetta, Bubulcus ibis, Botaurus stellaris, Sterna hirundo, Chlidonias leucopterus, Larus minutus, Larus argentatus, Larus ridibunbus, Alcedo atthis, Ciconia ciconia, Plegadis falcinellus, Circus aeruginosus, Corvus frugilegus

Keywords: Aquatic bird, Sattarkhan Lake, Identification, Iran

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1706
563 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1044
562 Calculus Logarithmic Function for Image Encryption

Authors: Adil AL-Rammahi

Abstract:

When we prefer to make the data secure from various attacks and fore integrity of data, we must encrypt the data before it is transmitted or stored. This paper introduces a new effective and lossless image encryption algorithm using a natural logarithmic function. The new algorithm encrypts an image through a three stage process. In the first stage, a reference natural logarithmic function is generated as the foundation for the encryption image. The image numeral matrix is then analyzed to five integer numbers, and then the numbers’ positions are transformed to matrices. The advantages of this method is useful for efficiently encrypting a variety of digital images, such as binary images, gray images, and RGB images without any quality loss. The principles of the presented scheme could be applied to provide complexity and then security for a variety of data systems such as image and others.

Keywords: Linear Systems, Image Encryption, Calculus.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2373
561 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

We have developed a better model for understanding the dynamics of malware spread in WMNs in this paper. The suggested model provides an insight into how viral propagation with energy exhaustion and various dispersed node densities might function. Based on a theoretical examination of the suggested model, we conclude that the threshold parameter could be used to identify the dynamics of viral spread globally. When the threshold is less than 1, the virus may be contained, but if it is greater than 1, a pandemic may result. Lastly, we discuss the various viral propagation strategies in relation to the distributed node densities and communication radii in WMNs. The aforementioned numerical simulation findings could serve as a guarantee of the theoretical analyses’ correctness.

Keywords: Bluetooth Security, Malware Propagation, Wireless Mesh Networks, Stability Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 368
560 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Survey of internet of things ecosystem, protocols, identity relation management, multifactor authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1266
559 Data-Reusing Adaptive Filtering Algorithms with Adaptive Error Constraint

Authors: Young-Seok Choi

Abstract:

We present a family of data-reusing and affine projection algorithms. For identification of a noisy linear finite impulse response channel, a partial knowledge of a channel, especially noise, can be used to improve the performance of the adaptive filter. Motivated by this fact, the proposed scheme incorporates an estimate of a knowledge of noise. A constraint, called the adaptive noise constraint, estimates an unknown information of noise. By imposing this constraint on a cost function of data-reusing and affine projection algorithms, a cost function based on the adaptive noise constraint and Lagrange multiplier is defined. Minimizing the new cost function leads to the adaptive noise constrained (ANC) data-reusing and affine projection algorithms. Experimental results comparing the proposed schemes to standard data-reusing and affine projection algorithms clearly indicate their superior performance.

Keywords: Data-reusing, affine projection algorithm, error constraint, system identification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1591
558 The Relationship between Students- Socio-Economic Backgrounds and Student Residential Satisfaction

Authors: Nurul ‘Ulyani Mohd Najib, Nor’ Aini Yusof, Zulkifli Osman

Abstract:

Debates on residential satisfaction topic have been vigorously discussed in family house setting. Nonetheless, less or lack of attention was given to survey on student residential satisfaction in the campus house setting. This study, however, tried to fill in the gap by focusing more on the relationship between students- socio-economic backgrounds and student residential satisfaction with their on-campus student housing facilities. Two-stage cluster sampling method was employed to classify the respondents. Then, self-administered questionnaires were distributed face-to-face to the students. In general, it was confirmed that the students- socioeconomic backgrounds have significantly influence the students- satisfaction with their on-campus student housing facilities. The main influential factors were revealed as the economic status, sense of sharing, and the ethnicity of roommates. Likewise, this study could also provide some useful feedback for the universities administration in order to improve their student housing facilities.

Keywords: Malaysia, Socio-economic, Student housing, Studentresidential satisfaction

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1977
557 Graves’ Disease and Its Related Single Nucleotide Polymorphisms and Genes

Authors: Yuhong Lu

Abstract:

Graves’ Disease (GD), an autoimmune health condition caused by the over reactiveness of the thyroid, affects about 1 in 200 people worldwide. GD is not caused by one specific single nucleotide polymorphism (SNP) or gene mutation, but rather determined by multiple factors, each differing from each other. Malfunction of the genes in Human Leukocyte Antigen (HLA) family tend to play a major role in autoimmune diseases, but other genes, such as LOC101929163, have functions that still remain ambiguous. Currently, little studies were done to study GD, resulting in inconclusive results. This study serves not only to introduce background knowledge about GD, but also to organize and pinpoint the major SNPs and genes that are potentially related to the occurrence of GD in humans. Collected from multiple sources from genome-wide association studies (GWAS) Central, the potential SNPs related to the causes of GD are included in this study. This study has located the genes that are related to those SNPs and closely examines a selected sample. Using the data from this study, scientists will then be able to focus on the most expressed genes in GD patients and develop a treatment for GD.

Keywords: CTLA4, Graves’ Disease, HLA, single nucleotide polymorphism, SNP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 534
556 Ficus deltoidea Extract Protects HaCaT Keratinocytes from UVB Irradiation-Induced Inflammation

Authors: Rosnani Hasham, Hyun Kyung Choi, Chang Seo Park

Abstract:

Ficus deltoidea from the Moraceae family is a popular medicinal herb in Malaysia. It possesses strong antioxidant and antiinflammatory properties. In the present study, the anti-inflammatory effects of F. deltoidea extract on UVB-irradiated HaCaT Keratinocytes were investigated. HaCaT Keratinocytes were UVBirradiated (12.5 mJ/cm3) and were treated with 0.05, 0.08 or 0.1% of F. deltoidea extract. Cell viability following UVB irradiation was significantly higher in the groups treated with the F. deltoidea extract at doses of 0.05, 0.08 or 0.1% than in control group with UVB irradiation only. Tumor necrosis factor-α (TNF-α), interleukin-1α (IL-1α), interleukin-6 (IL-6) and cyclooxygenase (COX-2) play primary roles in the inflammation process upon UV irradiation and are known to be stimulated by UVB irradiation. Treatment with the F. deltoidea extract dramatically inhibited the UV-induced TNF-α, IL-1α, IL-6, and COX-2 expression. These results suggest that the F. deltoidea extract inhibits the production of pro-inflammatory cytokines and may be an effective protective agent for the treatment of skin diseases.

Keywords: Ficus deltoidea, anti-inflammatory activity, cytokines, COX-2.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2805
555 Water Crisis Management in a Tourism Dependent Community

Authors: Aishath Shakeela

Abstract:

At a global level, water stewardship, water stress and water security are crucial factors in tourism planning and development considerations. Challenges associated with water is of particular concern to the Maldives as there is limited availability of freshwater, high dependency on desalinated water, and high unit cost associated with desalinating water. While the Maldives is promoted as an example of sustainable tourism, a key sustainability challenge facing tourism dependent communities is the efficient use and management of available water resources. A water crisis event in the capital island of Maldives highlighted how precarious water related issues are in this tourism dependent destination. Applying netnography, the focus of this working paper is to present community perceptions of how government policies addressed Malé Water and Sewerage Company (MWSC) water crisis event.

Keywords: Crisis management, government policies, Maldives, tourism, water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2095
554 Utilizing Innovative Techniques to Improve Email Security

Authors: Amany M. Alshawi, Khaled Alduhaiman

Abstract:

This paper proposes a technique to protect against email bombing. The technique employs a statistical approach, Naïve Bayes (NB), and Neural Networks to show that it is possible to differentiate between good and bad traffic to protect against email bombing attacks. Neural networks and Naïve Bayes can be trained by utilizing many email messages that include both input and output data for legitimate and non-legitimate emails. The input to the model includes the contents of the body of the messages, the subject, and the headers. This information will be used to determine if the email is normal or an attack email. Preliminary tests suggest that Naïve Bayes can be trained to produce an accurate response to confirm which email represents an attack.

Keywords: Email bombing, Legitimate email, Naïve Bayes, Neural networks, Non-legitimate email.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1394
553 Quality of Life: Expectations and Achievements of Middle Class in Kazakhstan

Authors: Nazym Shedenova, Aigul Beimisheva

Abstract:

The improvement of quality of life is the main visible integrated indicator of state well-being. More and more states pay attention to define and to achieve social standards of quality of life as social-economic strategy of development. These standards are determinate by state features, complex of needs and interests of individual, family and society. It still remains in open question: “What is middle class" in contemporary Kazakhstan. Appearance of new social standards of quality of life is important indicator of its successful establishment. The middle class as agent of social, politic and economic reforms promotes to improve the quality of life of the country. But if consider a low and a middle stratums of middle class, we can see that high social expectations and real achievements are still significantly different. The article relies on the sociological data, collected during of search of household-s standards of living in Almaty city and Almaty region, and case-study of cottage city “Jana Kuat".

Keywords: the quality of life, the social standards of life, the middle class of Kazakhstan, the economic behavior of households.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2710
552 Histopathological Alterations in Liver of Mice Exposed to Different Doses of Diclofenac Sodium

Authors: Deepak Mohan, Sushma Sharma

Abstract:

Diclofenac sodium, a member of the acetic acid family of non-steroidal anti-inflammatory drugs, is used to retard inflammation, arthritis pain and ankylosing spondylitis. The drug is known to cause severe injury in different tissues due to formation of reactive oxygen species. The present study is focused on the effect of different doses of diclofenac (4 mg/kg/body weight and 14 mg/kg/body weight on histoarchitecture of the liver from 7-28 days of the investigation. Diclofenac administration resulted in distorted hepatic degeneration and formation of wide areas in the form of sinusoidal gaps. Hepatic fibrosis noticed in different stages of investigation could be attributed to chronic inflammation and reactive oxygen species which results in deposition of extracellular matrix proteins. The abrupt degenerative changes observed during later stages of the experiment showed maximum damage to the liver, and there was enlargement of sinusoidal gaps accompanied by maximum necrosis in the tissues.

Keywords: Arthritis, diclofenac, histoarchitecture, sinusoidal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1129
551 Material Failure Process Simulation by Improve Finite Elements with Embedded Discontinuities

Authors: Juárez-Luna Gelacio, Ayala Gustavo, Retama-Velasco Jaime

Abstract:

This paper shows the advantages of the material failure process simulation by improve finite elements with embedded discontinuities, using a new definition of traction vector, dependent on the discontinuity length and the angle. Particularly, two families of this kind of elements are compared: kinematically optimal symmetric and statically and kinematically optimal non-symmetric. The constitutive model to describe the behavior of the material in the symmetric formulation is a traction-displacement jump relationship equipped with softening after reaching the failure surface.

To show the validity of this symmetric formulation, representative numerical examples illustrating the performance of the proposed formulation are presented. It is shown that the non-symmetric family may over or underestimate the energy required to create a discontinuity, as this effect is related with the total length of the discontinuity, fact that is not noticed when the discontinuity path is a straight line.

Keywords: Variational formulation, strong discontinuity, embedded discontinuities, strain localization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1748
550 Callusing in Stevia rebaudiana (Natural Sweetener) for Steviol Glycoside Production

Authors: Pratibha Gupta, Satyawati Sharma, Sanjay Saxena

Abstract:

Stevia rebaudiana Bertoni (natural sweetener) belongs to Asteraceae family and can be used as substitute of artificial sweeteners for diabetic patients. Conventionally, it is cultivated by seeds or stem cutting, but seed viability rate is poor. A protocol for callus induction and multiplication was developed to produce large no. of calli in short period. Surface sterilized nodal, leaf and root explants were cultured on Murashige and Skoog (MS) medium with different concentrations of plant hormone like, IBA, kinetin, NAA, 2,4-D, and NAA in combination with 2,4-D. 100% callusing was observed from leaf explants cultured on combination of NAA and 2,4-D after three weeks while with 2,4-D, only 10% callusing was observed. Calli obtained from leaf and root explants were shiny green while with nodal explants it was hard and brown. The present findings deal with induction of callusing in Stevia to achieve the rapid callus multiplication for study of steviol glycosides in callus culture.

Keywords: 2, 4-D, Callusing, NAA, Stevia, Steviol glycosides

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3227
549 A Visual Cryptography and Statistics Based Method for Ownership Identification of Digital Images

Authors: Ching-Sheng Hsu, Young-Chang Hou

Abstract:

In this paper, a novel copyright protection scheme for digital images based on Visual Cryptography and Statistics is proposed. In our scheme, the theories and properties of sampling distribution of means and visual cryptography are employed to achieve the requirements of robustness and security. Our method does not need to alter the original image and can identify the ownership without resorting to the original image. Besides, our method allows multiple watermarks to be registered for a single host image without causing any damage to other hidden watermarks. Moreover, it is also possible for our scheme to cast a larger watermark into a smaller host image. Finally, experimental results will show the robustness of our scheme against several common attacks.

Keywords: Copyright protection, digital watermarking, samplingdistribution, visual cryptography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1860
548 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: Smart grid, resilience, gas pipeline, cyber-physical attack, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1002
547 A Robust Data Hiding Technique based on LSB Matching

Authors: Emad T. Khalaf, Norrozila Sulaiman

Abstract:

Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into number of segments. However, the cover image will also be divided into the same number of segments. Each segment of data will be compared with each segment of image to find the best match segment, in order to create a new random sequence of segments to be inserted then in a cover image. Experimental results show that the proposed technique has a high security level and produced better stego-image quality.

Keywords: steganography; LSB Matching; RSA Encryption; data segments

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2199
546 Towards External Varieties to Internal Varieties − Modular Perspective

Authors: AHM Shamsuzzoha, Tauno Kekäle, Petri Helo

Abstract:

Product customization is an essential requirement for manufacturing firms to achieve higher customers- satisfaction and fulfill business target. In order to achieve these objectives, firms need to handle both external varieties such as customer preference, government regulations, cultural considerations etc and internal varieties such as functional requirements of product, production efficiency, quality etc. Both of the varieties need to be accumulated and integrated together for the purpose of producing customized product. These varieties are presented and discussed in this paper along with the perspectives of modular product design and development process. Other development strategies such as modularity, component commonality, product family design and product platform are presented with a view to achieve product variety quickly and economically. A case example both for the concept of modular design and platform based product development process is also presented with the help of design structure matrix (DSM) tool. This paper is concluded with several managerial implications and future research direction.

Keywords: Customization modular design, platform development, product variety.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1443
545 De-noising Infrared Image Using OWA Based Filter

Authors: Ruchika, Munish Vashisht, S. Qamar

Abstract:

Detection of small ship is crucial task in many automatic surveillance systems which are employed for security of maritime boundaries of a country. To address this problem, image de-noising is technique to identify the target ship in between many other ships in the sea. Image de-noising technique needs to extract the ship’s image from sea background for the analysis as the ship’s image may submerge in the background and flooding waves. In this paper, a noise filter is presented that is based on fuzzy linguistic ‘most’ quantifier. Ordered weighted averaging (OWA) function is used to remove salt-pepper noise of ship’s image. Results obtained are in line with the results available by other well-known median filters and OWA based approach shows better performance.

Keywords: Linguistic quantifier, impulse noise, OWA filter, median filter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 911
544 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C.-Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: Biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1821
543 A Novel Arabic Text Steganography Method Using Letter Points and Extensions

Authors: Adnan Abdul-Aziz Gutub, Manal Mohammad Fattani

Abstract:

This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.

Keywords: Arabic text, Cryptography, Feature coding, Information security, Text steganography, Text watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3488
542 Network Anomaly Detection using Soft Computing

Authors: Surat Srinoy, Werasak Kurutach, Witcha Chimphlee, Siriporn Chimphlee

Abstract:

One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature selection heuristics and using rough fuzzy for clustering data. ICA is to separate these independent components (ICs) from the monitored variables. Rough set has to decrease the amount of data and get rid of redundancy and Fuzzy methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining- (KDDCup 1999) dataset.

Keywords: Network security, intrusion detection, rough set, ICA, anomaly detection, independent component analysis, rough fuzzy .

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
541 Stego Machine – Video Steganography using Modified LSB Algorithm

Authors: Mritha Ramalingam

Abstract:

Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. This paper designs a stego machine to develop a steganographic application to hide data containing text in a computer video file and to retrieve the hidden information. This can be designed by embedding text file in a video file in such away that the video does not loose its functionality using Least Significant Bit (LSB) modification method. This method applies imperceptible modifications. This proposed method strives for high security to an eavesdropper-s inability to detect hidden information.

Keywords: Data hiding, LSB, Stego machine, VideoSteganography

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4237
540 Aircraft Supplier Selection Process with Fuzzy Proximity Measure Method using Multiple Criteria Group Decision Making Analysis

Authors: C. Ardil

Abstract:

Being effective in every organizational activity has become necessary due to the escalating level of competition in all areas of corporate life. In the context of supply chain management, aircraft supplier selection is currently one of the most crucial activities. It is possible to choose the best aircraft supplier and deliver efficiency in terms of cost, quality, delivery time, economic status, and institutionalization if a systematic supplier selection approach is used. In this study, an effective multiple criteria decision-making methodology, proximity measure method (PMM), is used within a fuzzy environment based on the vague structure of the real working environment. The best appropriate aircraft suppliers are identified and ranked after the proposed multiple criteria decision making technique is used in a real-life scenario.

Keywords: Aircraft supplier selection, multiple criteria decision making, fuzzy sets, proximity measure method, Minkowski distance family function, Hausdorff distance function, PMM, MCDM

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 297